Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,060 --> 00:00:05,970
For the Tor browser now, the Tor browser is essentially a regular internet browser, just like Chrome
2
00:00:05,970 --> 00:00:06,930
and Firefox.
3
00:00:07,350 --> 00:00:13,440
However, it's built around privacy, and this is going to be really important for this investigation,
4
00:00:14,130 --> 00:00:16,290
and it can also be important for everyday use.
5
00:00:17,010 --> 00:00:20,550
So it operates a lot like any other browser Chrome.
6
00:00:20,550 --> 00:00:21,600
Firefox.
7
00:00:22,780 --> 00:00:24,610
Microsoft Edge, what not.
8
00:00:25,790 --> 00:00:31,520
However, again, this is built around privacy, and it's pre-loaded into CSI Linux, and we can run
9
00:00:31,520 --> 00:00:34,220
it by clicking this little purple onion looking icon.
10
00:00:34,820 --> 00:00:41,210
You can also install it for things like Windows or other Linux distributions or OS X.
11
00:00:41,570 --> 00:00:43,280
Now, let's take a look at how this works.
12
00:00:44,520 --> 00:00:48,540
So in this example, I'm getting this from the Tor project.
13
00:00:49,570 --> 00:00:57,100
Alice is going out to the internet, so Alice establishes an encrypted link to a Tor node.
14
00:00:57,520 --> 00:00:59,240
In this case, it's Dave here.
15
00:00:59,710 --> 00:01:03,160
So right off the bat, it's sending an encrypted signal out.
16
00:01:05,680 --> 00:01:10,690
Now, when it goes out in the internet, wherever you're going, it's going to take a random path to
17
00:01:10,690 --> 00:01:11,290
get there.
18
00:01:11,410 --> 00:01:17,320
And what it does is it hops through all these Tor nodes and it's completely encrypted going there.
19
00:01:18,580 --> 00:01:25,150
No, on the final note, is going over to this computer over here over an unencrypted link.
20
00:01:26,610 --> 00:01:33,420
Now on the way back, this is actually pretty interesting, and let me briefly read this from the Tor
21
00:01:33,420 --> 00:01:33,780
site.
22
00:01:34,380 --> 00:01:41,910
So over the circuit that establishes you could actually run different type of thing, software applications
23
00:01:41,910 --> 00:01:43,470
or whatnot over the Tor network.
24
00:01:43,890 --> 00:01:47,460
Now, because of relays, see no more than one hop in the circuit.
25
00:01:47,790 --> 00:01:53,670
Neither eavesdropper or compromise relay can use a traffic analysis to link it back to the source.
26
00:01:53,910 --> 00:01:54,900
In other words, you.
27
00:01:56,080 --> 00:02:01,270
Tor only works over TCP streams and can only be used by applications with the SoC support.
28
00:02:01,570 --> 00:02:03,220
So this is actually really.
29
00:02:04,790 --> 00:02:11,090
Secure connection it's encrypted is taking a random route to get to get out to wherever it's going.
30
00:02:11,600 --> 00:02:17,270
So again is something if someone's launching a man a mill attack, they're not going to know how to
31
00:02:17,270 --> 00:02:18,160
get back to you.
32
00:02:19,070 --> 00:02:21,890
There, in fact, these connections have a limited time.
33
00:02:22,610 --> 00:02:26,910
Time to live on for this before it takes a different route back to you again.
34
00:02:26,930 --> 00:02:27,440
So this is.
35
00:02:28,440 --> 00:02:34,470
Why the Tor browser, so, so important to use, especially if you're doing again, this investigation
36
00:02:34,470 --> 00:02:40,710
of security, things like that, because first of all, it's encrypted connection and also eavesdroppers
37
00:02:40,710 --> 00:02:42,870
are going to have a really hard time to figure out.
38
00:02:44,070 --> 00:02:49,230
How to trace it back to you, because it's going through all these different, different relays, which
39
00:02:49,230 --> 00:02:54,570
also is why it takes a while when you're going to websites because you're hopping through all these
40
00:02:54,570 --> 00:02:57,960
random relays instead of taking a direct route to wherever you're going.
41
00:02:58,740 --> 00:03:04,260
So if you want to stay anonymous, if you want extra security and if you're going to be browsing the
42
00:03:04,270 --> 00:03:07,020
dark web, you are going to need to use Tor browser.
43
00:03:08,160 --> 00:03:14,700
And again, it's built into CSI Linux, however, you can go ahead and download it for Windows, other
44
00:03:14,700 --> 00:03:17,130
Linux or Substitutions or OSX.
45
00:03:17,520 --> 00:03:18,330
Thanks for watching.
46
00:03:18,360 --> 00:03:19,350
I'll see you next VIDEO.
4668
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.